treewide: Unify Google branding

Branding changes to unify and update Chrome OS to ChromeOS (removing the
space).

This CL also includes changing Chromium OS to ChromiumOS as well.

BUG=None
TEST=N/A

Change-Id: I39af9f1069b62747dbfeebdd62d85fabfa655dcd
Signed-off-by: Jon Murphy <jpmurphy@google.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/65479
Reviewed-by: Jack Rosenthal <jrosenth@chromium.org>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Felix Singer <felixsinger@posteo.net>
This commit is contained in:
Jon Murphy
2022-06-28 10:36:23 -06:00
committed by Felix Held
parent dc86804a7d
commit c4e90454f4
82 changed files with 126 additions and 126 deletions

View File

@@ -3,7 +3,7 @@
#include <acpi/acpigen_extern.asl>
#if CONFIG(CHROMEOS_NVS)
/* Chrome OS specific */
/* ChromeOS specific */
#include <vendorcode/google/chromeos/acpi/chromeos.asl>
#endif

View File

@@ -203,7 +203,7 @@ struct elog_event_data_wake {
uint32_t instance;
} __packed;
/* Chrome OS related events */
/* ChromeOS related events */
#define ELOG_TYPE_CROS_DEVELOPER_MODE 0xa0
#define ELOG_TYPE_CROS_RECOVERY_MODE 0xa1
#define ELOG_CROS_RECOVERY_MODE_BUTTON 0x02
@@ -305,7 +305,7 @@ struct elog_event_mem_cache_update {
#define ELOG_TYPE_MI_HRPC 0xb4
#define ELOG_TYPE_MI_HR 0xb5
/* Chrome OS diagnostics-related events */
/* ChromeOS diagnostics-related events */
#define ELOG_TYPE_CROS_DIAGNOSTICS 0xb6
#define ELOG_CROS_LAUNCH_DIAGNOSTICS 0x01

View File

@@ -165,7 +165,7 @@ enum timestamp_id {
TS_KERNEL_START = 1101,
TS_KERNEL_DECOMPRESSION = 1102,
/* 1200-1300: Chrome OS Hypervisor */
/* 1200-1300: ChromeOS Hypervisor */
TS_CRHV_BOOT = 1200,
TS_CRHV_PLATFORM_INIT = 1201,
TS_CRHV_SERVICES_STARTED = 1202,
@@ -247,10 +247,10 @@ static const struct timestamp_id_to_name {
TS_NAME_DEF(TS_EC_HASH_READY, 0, "EC vboot hash ready"),
TS_NAME_DEF(TS_EC_POWER_LIMIT_WAIT, 0, "waiting for EC to allow higher power draw"),
TS_NAME_DEF(TS_EC_SYNC_END, 0, "finished EC software sync"),
TS_NAME_DEF(TS_COPYVPD_START, TS_COPYVPD_RW_END, "starting to load Chrome OS VPD"),
TS_NAME_DEF(TS_COPYVPD_START, TS_COPYVPD_RW_END, "starting to load ChromeOS VPD"),
TS_NAME_DEF(TS_COPYVPD_RO_END, TS_COPYVPD_RW_END,
"finished loading Chrome OS VPD (RO)"),
TS_NAME_DEF(TS_COPYVPD_RW_END, 0, "finished loading Chrome OS VPD (RW)"),
"finished loading ChromeOS VPD (RO)"),
TS_NAME_DEF(TS_COPYVPD_RW_END, 0, "finished loading ChromeOS VPD (RW)"),
TS_NAME_DEF(TS_TPM_ENABLE_UPDATE_START, TS_TPM_ENABLE_UPDATE_END,
"started TPM enable update"),
TS_NAME_DEF(TS_TPM_ENABLE_UPDATE_END, 0, "finished TPM enable update"),
@@ -344,7 +344,7 @@ static const struct timestamp_id_to_name {
TS_NAME_DEF(TS_KERNEL_START, 0, "jumping to kernel"),
TS_NAME_DEF(TS_KERNEL_DECOMPRESSION, 0, "starting kernel decompression/relocation"),
/* Chrome OS hypervisor */
/* ChromeOS hypervisor */
TS_NAME_DEF(TS_CRHV_BOOT, 0, "hypervisor boot finished"),
TS_NAME_DEF(TS_CRHV_PLATFORM_INIT, 0, "hypervisor platform initialized"),
TS_NAME_DEF(TS_CRHV_SERVICES_STARTED, 0, "hypervisor services started"),

View File

@@ -2,6 +2,6 @@ config CHROMEOS_CAMERA
bool
default n
help
Camera with identifiers following Chrome OS Camera Info. The info is
Camera with identifiers following ChromeOS Camera Info. The info is
usually available on MIPI camera EEPROM for identifying correct
drivers and config.

View File

@@ -42,7 +42,7 @@ static void save_memory_training_data(bool s3wake, uint32_t fsp_version)
/*
* Save MRC Data to CBMEM. By always saving the data this forces
* a retrain after a trip through Chrome OS recovery path. The
* a retrain after a trip through ChromeOS recovery path. The
* code which saves the data to flash doesn't write if the latest
* training data matches this one.
*/

View File

@@ -125,9 +125,9 @@ config EC_GOOGLE_CHROMEEC_PD_BOARDNAME
config EC_GOOGLE_CHROMEEC_RTC
depends on EC_GOOGLE_CHROMEEC
bool "Enable Chrome OS EC RTC"
bool "Enable ChromeOS EC RTC"
help
Enable support for the real-time clock on the Chrome OS EC. This
Enable support for the real-time clock on the ChromeOS EC. This
uses the EC_CMD_RTC_GET_VALUE command to read the current time.
choice
@@ -194,7 +194,7 @@ config EC_GOOGLE_CHROMEEC_SWITCHES
depends on EC_GOOGLE_CHROMEEC && VBOOT
bool
help
Enable support for Chrome OS mode switches provided by the Chrome OS
Enable support for ChromeOS mode switches provided by the ChromeOS
EC.
config EC_GOOGLE_CHROMEEC_INCLUDE_SSFC_IN_FW_CONFIG

View File

@@ -1,7 +1,7 @@
/* SPDX-License-Identifier: GPL-2.0-only */
/*
* Chrome OS Embedded Controller interface
* ChromeOS Embedded Controller interface
*
* Constants that should be defined:
*

View File

@@ -1,5 +1,5 @@
/*
* Chromium OS Matrix Keyboard Message Protocol definitions
* ChromiumOS Matrix Keyboard Message Protocol definitions
*/
/* SPDX-License-Identifier: GPL-2.0-or-later */
@@ -9,7 +9,7 @@
/*
* Command interface between EC and AP, for LPC, I2C and SPI interfaces.
*
* This is copied from the Chromium OS Open Source Embedded Controller code.
* This is copied from the ChromiumOS Open Source Embedded Controller code.
*/
enum {
/* The header byte, which follows the preamble */

View File

@@ -1,4 +1,4 @@
# Firmware Layout Description for Chrome OS.
# Firmware Layout Description for ChromeOS.
#
# The size and address of every section must be aligned to at least 4K, except:
# RO_FRID, RW_FWID*, GBB, or any unused / padding / CBFS type sections.

View File

@@ -97,7 +97,7 @@ config CHROMEOS
select HAS_RECOVERY_MRC_CACHE
config CHROMEOS_WIFI_SAR
bool "Enable SAR options for Chrome OS build"
bool "Enable SAR options for ChromeOS build"
depends on CHROMEOS
select DSAR_ENABLE
select GEO_SAR_ENABLE

View File

@@ -36,7 +36,7 @@ DefinitionBlock(
/* Chipset specific sleep states */
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -79,7 +79,7 @@ chip soc/intel/alderlake
chip drivers/gfx/generic
register "device_count" = "1"
register "device[0].name" = ""LCD""
# Use Chrome OS privacy screen _HID
# Use ChromeOS privacy screen _HID
register "device[0].hid" = ""GOOG0010""
# Internal panel on the first port of the graphics chip
register "device[0].addr" = "0x80010400"

View File

@@ -71,7 +71,7 @@ chip soc/intel/alderlake
chip drivers/gfx/generic
register "device_count" = "1"
register "device[0].name" = ""LCD""
# Use Chrome OS privacy screen _HID
# Use ChromeOS privacy screen _HID
register "device[0].hid" = ""GOOG0010""
# Internal panel on the first port of the graphics chip
register "device[0].addr" = "0x80010400"

View File

@@ -570,7 +570,7 @@ chip soc/intel/alderlake
end
chip drivers/i2c/generic
register "hid" = ""GOOG0020""
register "desc" = ""Chrome OS HPS""
register "desc" = ""ChromeOS HPS""
register "enable_gpio" = "ACPI_GPIO_OUTPUT_ACTIVE_HIGH(GPP_E7)" # EN_HPS_PWR
register "irq" = "ACPI_IRQ_LEVEL_LOW(GPP_E3_IRQ)" # HPS_INT_ODL
# HPS uses I2C addresses 0x30 and 0x51.

View File

@@ -571,7 +571,7 @@ chip soc/intel/alderlake
end
chip drivers/i2c/generic
register "hid" = ""GOOG0020""
register "desc" = ""Chrome OS HPS""
register "desc" = ""ChromeOS HPS""
register "enable_gpio" = "ACPI_GPIO_OUTPUT_ACTIVE_HIGH(GPP_E7)" # EN_HPS_PWR
register "irq" = "ACPI_IRQ_LEVEL_LOW(GPP_E3_IRQ)" # HPS_INT_ODL
# HPS uses I2C addresses 0x30 and 0x51.

View File

@@ -99,7 +99,7 @@ chip soc/intel/alderlake
chip drivers/gfx/generic
register "device_count" = "1"
register "device[0].name" = ""LCD""
# Use Chrome OS privacy screen _HID
# Use ChromeOS privacy screen _HID
register "device[0].hid" = ""GOOG0010""
# Internal panel on the first port of the graphics chip
register "device[0].addr" = "0x80010400"

View File

@@ -85,7 +85,7 @@ chip soc/intel/alderlake
chip drivers/gfx/generic
register "device_count" = "1"
register "device[0].name" = ""LCD""
# Use Chrome OS privacy screen _HID
# Use ChromeOS privacy screen _HID
register "device[0].hid" = ""GOOG0010""
# Internal panel on the first port of the graphics chip
register "device[0].addr" = "0x80010400"

View File

@@ -570,7 +570,7 @@ chip soc/intel/alderlake
end
chip drivers/i2c/generic
register "hid" = ""GOOG0020""
register "desc" = ""Chrome OS HPS""
register "desc" = ""ChromeOS HPS""
register "enable_gpio" = "ACPI_GPIO_OUTPUT_ACTIVE_HIGH(GPP_E7)" # EN_HPS_PWR
register "irq" = "ACPI_IRQ_LEVEL_LOW(GPP_E3_IRQ)" # HPS_INT_ODL
# HPS uses I2C addresses 0x30 and 0x51.

View File

@@ -416,7 +416,7 @@ chip soc/intel/alderlake
device ref i2c2 on
chip drivers/i2c/generic
register "hid" = ""GOOG0020""
register "desc" = ""Chrome OS HPS""
register "desc" = ""ChromeOS HPS""
register "enable_gpio" = "ACPI_GPIO_OUTPUT_ACTIVE_HIGH(GPP_E7)" # EN_HPS_PWR
register "irq" = "ACPI_IRQ_LEVEL_LOW(GPP_E3_IRQ)" # HPS_INT_ODL
# HPS uses I2C addresses 0x30 and 0x51.

View File

@@ -320,7 +320,7 @@ chip soc/intel/alderlake
device ref i2c2 on
chip drivers/i2c/generic
register "hid" = ""GOOG0020""
register "desc" = ""Chrome OS HPS""
register "desc" = ""ChromeOS HPS""
register "enable_gpio" = "ACPI_GPIO_OUTPUT_ACTIVE_HIGH(GPP_E7)" # EN_HPS_PWR
register "irq" = "ACPI_IRQ_LEVEL_LOW(GPP_E3_IRQ)" # HPS_INT_ODL
# HPS uses I2C addresses 0x30 and 0x51.

View File

@@ -94,7 +94,7 @@ chip soc/intel/alderlake
chip drivers/gfx/generic
register "device_count" = "1"
register "device[0].name" = ""LCD""
# Use Chrome OS privacy screen _HID
# Use ChromeOS privacy screen _HID
register "device[0].hid" = ""GOOG0010""
# Internal panel on the first port of the graphics chip
register "device[0].addr" = "0x80010400"

View File

@@ -1,4 +1,4 @@
# Firmware Layout Description for Chrome OS.
# Firmware Layout Description for ChromeOS.
#
# The size and address of every section must be aligned to at least 4K, except:
# RO_FRID, RW_FWID*, GBB, or any unused / padding / CBFS type sections.

View File

@@ -1,4 +1,4 @@
# Firmware Layout Description for Chrome OS.
# Firmware Layout Description for ChromeOS.
#
# The size and address of every section must be aligned to at least 4K, except:
# RO_FRID, RW_FWID*, GBB, or any unused / padding / CBFS type sections.

View File

@@ -65,7 +65,7 @@ config CHROMEOS
select VBOOT_LID_SWITCH
config CHROMEOS_WIFI_SAR
bool "Enable SAR options for Chrome OS build"
bool "Enable SAR options for ChromeOS build"
depends on CHROMEOS
select DSAR_ENABLE
select SAR_ENABLE

View File

@@ -37,7 +37,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -39,7 +39,7 @@ config CHROMEOS
select GBB_FLAG_DISABLE_EC_SOFTWARE_SYNC
config CHROMEOS_WIFI_SAR
bool "Enable SAR options for Chrome OS build"
bool "Enable SAR options for ChromeOS build"
depends on CHROMEOS
select DSAR_ENABLE
select GEO_SAR_ENABLE

View File

@@ -33,7 +33,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -34,7 +34,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -33,7 +33,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -15,7 +15,7 @@ DefinitionBlock (
#include <acpi/dsdt_top.asl>
#include <soc.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -182,7 +182,7 @@ chip soc/amd/cezanne
chip drivers/gfx/generic
register "device_count" = "1"
register "device[0].name" = ""LCD""
# Use Chrome OS privacy screen _HID
# Use ChromeOS privacy screen _HID
register "device[0].hid" = ""GOOG0010""
# Internal panel on the first port of the graphics chip
register "device[0].addr" = "0x80010400"

View File

@@ -166,7 +166,7 @@ config CHROMEOS
select CHROMEOS_CSE_BOARD_RESET_OVERRIDE if SOC_INTEL_CSE_LITE_SKU
config CHROMEOS_WIFI_SAR
bool "Enable SAR options for Chrome OS build"
bool "Enable SAR options for ChromeOS build"
depends on CHROMEOS
select DSAR_ENABLE
select GEO_SAR_ENABLE

View File

@@ -35,7 +35,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -52,7 +52,7 @@ DefinitionBlock (
/* Thermal handler */
#include <variant/acpi/thermal.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -1,4 +1,4 @@
# Firmware Layout Description for Chrome OS.
# Firmware Layout Description for ChromeOS.
#
# The size and address of every section must be aligned to at least 4K, except:
# RO_FRID, RW_FWID*, GBB, or any unused / padding / CBFS type sections.

View File

@@ -32,7 +32,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -41,7 +41,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -32,7 +32,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -34,7 +34,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
#if CONFIG(EC_GOOGLE_WILCO)
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -15,7 +15,7 @@ DefinitionBlock (
#include <acpi/dsdt_top.asl>
#include <soc.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -140,7 +140,7 @@ config VBOOT_GSCVD
default n
config CHROMEOS_WIFI_SAR
bool "Enable SAR options for Chrome OS build"
bool "Enable SAR options for ChromeOS build"
depends on CHROMEOS
select DSAR_ENABLE
select GEO_SAR_ENABLE

View File

@@ -36,7 +36,7 @@ DefinitionBlock(
#include "mainboard.asl"
}
// Chrome OS Embedded Controller
// ChromeOS Embedded Controller
Scope (\_SB.PCI0.LPCB)
{
// ACPI code for EC SuperIO functions

View File

@@ -44,7 +44,7 @@ DefinitionBlock (
/* Thermal handler */
#include <variant/acpi/thermal.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -28,7 +28,7 @@ DefinitionBlock(
}
#if CONFIG(EC_GOOGLE_CHROMEEC)
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -31,7 +31,7 @@ DefinitionBlock(
#include <southbridge/intel/common/acpi/sleepstates.asl>
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -31,7 +31,7 @@ DefinitionBlock(
}
#if CONFIG(EC_GOOGLE_CHROMEEC)
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -31,7 +31,7 @@ DefinitionBlock(
}
#if CONFIG(EC_GOOGLE_CHROMEEC)
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -30,7 +30,7 @@ DefinitionBlock(
}
}
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
// ACPI code for EC SuperIO functions

View File

@@ -33,7 +33,7 @@ DefinitionBlock(
}
#if CONFIG(EC_GOOGLE_CHROMEEC)
/* Chrome OS Embedded Controller */
/* ChromeOS Embedded Controller */
Scope (\_SB.PCI0.LPCB)
{
/* ACPI code for EC SuperIO functions */

View File

@@ -103,7 +103,7 @@ config VBOOT_DISABLE_DEV_ON_RECOVERY
bool
default n
help
When this option is enabled, the Chrome OS device leaves the
When this option is enabled, the ChromeOS device leaves the
developer mode as soon as recovery request is detected. This is
handy on embedded devices with limited input capabilities.
@@ -321,10 +321,10 @@ config GBB_HWID
string "Hardware ID"
default ""
help
A hardware identifier for device. On Chrome OS this is used for auto
A hardware identifier for device. On ChromeOS this is used for auto
update and recovery, and will be generated when manufacturing by the
factory software, in a strictly defined format.
Leave empty to get a test-only Chrome OS HWID v2 string generated.
Leave empty to get a test-only ChromeOS HWID v2 string generated.
config GBB_BMPFV_FILE
string "Path to bmpfv image"
@@ -339,7 +339,7 @@ config GBB_FLAG_LOAD_OPTION_ROMS
default n
config GBB_FLAG_ENABLE_ALTERNATE_OS
bool "Allow booting a non-Chrome OS kernel if dev switch is on"
bool "Allow booting a non-ChromeOS kernel if dev switch is on"
default n
config GBB_FLAG_FORCE_DEV_SWITCH_ON

View File

@@ -434,7 +434,7 @@ config VBOOT_STARTS_BEFORE_BOOTBLOCK
select ARCH_VERSTAGE_ARMV7
help
Runs verstage on the PSP. Only available on
certain Chrome OS branded parts from AMD.
certain ChromeOS branded parts from AMD.
config VBOOT_HASH_BLOCK_SIZE
hex

View File

@@ -466,7 +466,7 @@ config VBOOT_STARTS_BEFORE_BOOTBLOCK
select ARCH_VERSTAGE_ARMV7
help
Runs verstage on the PSP. Only available on
certain Chrome OS branded parts from AMD.
certain ChromeOS branded parts from AMD.
config VBOOT_HASH_BLOCK_SIZE
hex

View File

@@ -454,7 +454,7 @@ config VBOOT_STARTS_BEFORE_BOOTBLOCK
select ARCH_VERSTAGE_ARMV7
help
Runs verstage on the PSP. Only available on
certain Chrome OS branded parts from AMD.
certain ChromeOS branded parts from AMD.
config VBOOT_HASH_BLOCK_SIZE
hex

View File

@@ -490,7 +490,7 @@ uint8_t cse_wait_com_soft_temp_disable(void);
/*
* The CSE Lite SKU supports notion of RO and RW boot partitions. The function will set
* CSE's boot partition as per Chrome OS boot modes. In normal mode, the function allows CSE to
* CSE's boot partition as per ChromeOS boot modes. In normal mode, the function allows CSE to
* boot from RW and triggers recovery mode if CSE fails to jump to RW.
* In software triggered recovery mode, the function allows CSE to boot from whatever is
* currently selected partition.

View File

@@ -46,7 +46,7 @@ static void set_cs(const struct spi_bitbang_ops *ops, int value)
gpio_set(slave->cs, value);
}
/* Can't use GPIO() here because of bug in GCC version used by Chromium OS. */
/* Can't use GPIO() here because of bug in GCC version used by ChromiumOS. */
static const struct rockchip_bitbang_slave slaves[] = {
[0] = {
.ops = { get_miso, set_mosi, set_clk, set_cs },

View File

@@ -23,7 +23,7 @@ config CHROMEOS
if CHROMEOS
config CHROMEOS_RAMOOPS
bool "Reserve space for Chrome OS ramoops"
bool "Reserve space for ChromeOS ramoops"
default y
config CHROMEOS_RAMOOPS_RAM_SIZE

View File

@@ -11,7 +11,7 @@
* The Linux kernel implementation can be found at
* drivers/net/usb/r8152.c:vendor_mac_passthru_addr_read()
*
* For Chrome OS, the policy which controls where the dock MAC address
* For ChromeOS, the policy which controls where the dock MAC address
* comes from is written into RW_VPD property "dock_passthrough":
*
* "dock_mac" or empty: Use MAC address from RO_VPD value "dock_mac"

View File

@@ -38,7 +38,7 @@ void chromeos_set_ramoops(void *ram_oops, size_t size);
enum cb_err get_dsm_calibration_from_key(const char *key, uint64_t *value);
/*
* Declaration for mainboards to use to generate ACPI-specific Chrome OS needs.
* Declaration for mainboards to use to generate ACPI-specific ChromeOS needs.
*/
void chromeos_acpi_gpio_generate(void);